Skip to main content

About your Search

20130201
20130209
Search Results 0 to 2 of about 3 (some duplicates have been removed)
year or 2010. the first target could be in iowa where representative steve king is considering running for the congress in 2014 but the head of the conservative fund the conservative defeat project telling politico, another example of the republican establish's hostility toward its conservative base rather than listening to the grass roots and working to advance their principles, the establishment has chosen to declare war on the party's most loyal supporters and from red state, quote, i share any candidate who gets this group's support should be targeted for destruction by the conservative movement. joining me is editor mark murray. but the reality you and the first read team say this could and perhaps will get ugly here. >> well, it could get ugly. also railroad healthy. this is something that all parties go through after losing elections, particularly losing back to back presidential contests and crossroads, same organization trying to have a new outfit and outshoot saying it comes down to capable candidates versus incompetent ones and sometimes that capability is in the eye of the
saying you can't walk on water. >>> i'm steve kornacki. is football worth dying for? former players take on the nfl trying to save the league if itself. >>> i'm kristal ball. >> my plea to beyonce. maybe i'll sing it. watch and find out. >>> one of the ben filths of having the worldwide resources of nbc news behind you is that you get exclusives like this. the doj memo that explains why it believes it's perfectly legal for the president to kill any american overseas who's a suspected senior terror leader. according to the 16-page memo, the executive branch doesn't have to answer to anyone, not the courts, not congress. no one. it lays out a three-part kill list criteria, step one, informed high level u.s. official has determined the target poses a, quote, iminnocent threat of violent attack and clear evidence of an attack is not required. step two, capture must be, qu
Search Results 0 to 2 of about 3 (some duplicates have been removed)